CVE-2008-1602: Stack-based buffer overflow in Orbit downloader 2.6.3 and 2.6.4 allows remote attackers to execute arbitrary code via a long download URL, which is not properly handled during Unicode conversion for a balloon notification after a download has failed
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | Orbit Downloader URL Unicode conversion buffer overflow | 7 Jul 200800:00 | β | saint |
![]() | Orbit Downloader URL Unicode conversion buffer overflow | 7 Jul 200800:00 | β | saint |
![]() | Orbit Downloader URL Unicode conversion buffer overflow | 7 Jul 200800:00 | β | saint |
![]() | Orbit Downloader URL Unicode conversion buffer overflow | 7 Jul 200800:00 | β | saint |
![]() | Orbit Downloader Download Argument Processing Stack Buffer Overflow (CVE-2008-1602) | 21 Feb 201000:00 | β | checkpoint_advisories |
![]() | OrbitDownloader buffer overflow | 5 Apr 200800:00 | β | securityvulns |
![]() | CORE-2008-0314 - Orbit Downloader "Download failed" buffer overflow | 5 Apr 200800:00 | β | securityvulns |
![]() | Stack overflow | 6 Apr 200823:44 | β | prion |
![]() | CVE-2008-1602 | 6 Apr 200823:44 | β | nvd |
![]() | Orbit Downloader URL Unicode Conversion Overflow | 23 Feb 201200:00 | β | zdt |
Source | Link |
---|---|
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/41649 |
securityreason | www.securityreason.com/securityalert/3798 |
vupen | www.vupen.com/english/advisories/2008/1101 |
securityfocus | www.securityfocus.com/bid/28541 |
secunia | www.secunia.com/advisories/29669 |
securityfocus | www.securityfocus.com/archive/1/490458/100/0/threaded |
coresecurity | www.coresecurity.com/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo